| Home |
Hello, Welcome to my personal column !! If it's all curiosity to know about me has brought you here then I promise that your expectations won't be laid down. Before you could know few things about me (*us), I would prefer taking you through a quick tour of my world; the *real world* from where I (*we all) belongs to. Every object (living / non-living) in this universe is virtually divided into two parts - *The dark (evil)* side & *The bright (good)* side. I belong to the community from where we can see both dark and white side of any objects; our judgments and creations impacts rest of the world; yeah!! we are the people who innovates & exposes the dark side of every objects in this planet. We are the people who made the boring world of IT professionals a little bit interesting and painful when it comes to security ;-)
While *we recognise our distinctive existence as a group, as programmers, as innovators or creators or scientists or researchers, we rarely see these ways of representing ourselves as mere fragments of a class experience that is still struggling to express itself as itself, as expressions of the process of producing abstraction in the world. Geeks and freaks become what they are negatively, through their exclusion by others. Hackers are a class, but an abstract class, a class as yet to hack itself into manifest existence as itself.
I hail from the world of
rul3-br3ak3rs; love to play with high-end security systems and never mind
exploiting any vulnerabilities associated with them. From a very young age, I
was always a curious person. This love of technology stems from a very early
childhood where my parents made sure that my education was of the highest
caliber available in the area where I grew up. At a very young age, electronic
toys that I was given were taken apart to see what made them work. I also had an
incredible curiosity when any of the service personnel would come to the house
to attend to any of the problems from the televisions, to the intercom system,
telephone systems, and any other of the systems that are in the house.
I guess I would imagine that my first exposure to hacking a system would have begun with my early fascination with computer viruses and worms. Developed interest into the field of vulnerability research and malware analysis during my engineering days (1997 - 2001). Often fascinated by any kind of offensive techniques used against any system to break its usual flow. I always believe in home-grown stuffs; be it electronic items or as sophisticated as a PC or Laptop. Since, my teen age I love to create or invent new things or techniques by manipulating existing things. For example - Converting an old TV into a gaming console. This modified TV com gaming console had the monitor as the play-station and a modified key keyboard controllers to communicate via IR. Yeah !! I am talking about things during the year 1995 in India. During the year 1992, I created a home grown antenna which can access nearest cable TV distributor signals @ absolutely free of cost. Similarly with time, I started creating many new things by spending my own pocket money.
I fell in love with programming when I realized that it makes things easier for me to manipulate a PC in the way I want it to behave. The first useful PC program I wrote was to convert a Win95/98 machine into a WinNT type workstation (during 1997). This program covers various security related gaps between Win95/98 and WinNT. The program became very popular and got published in one of the most popular IT Magazine in India called 'Digit' (presently called 'Chip'). I received tons of appreciation mails and few encouragement mails from people who claimed to be my fans. Then onwards, I wrote programs to crack or retrieve passwords from remote systems, dial-ups, databases etc. As mentioned earlier, I am always fascinated by the dark side of anything I like. It became such that, where someone sees a feature, I see a hole just by looking at it.
My area of interests involves Penetration Testing and Vulnerability research. I have got core expertise in the area of Penetration Testing, Vulnerability Research and Security Software development. Conducted penetration testing for several International and Indian customers. Being a vulnerability researcher, pen-testing becomes fun for me as I have better understanding of the loopholes. I have also done beta security testing for the worlds largest IT firm (use your imagination to guess the name ;-). Sorry, can't take the name in public because of those strict NDAs. My resume can be viewed only on request by corporate who are working in the area of my interests. I am not going to send my resume to any Tom, Dick & Harry, hence make sure you mail me from your corporate id. If I find the company profile interesting then I might respond.
Feel free to mail me, if you have an interesting offer, if you have something funny to say, if you want to drop few good words to me or anything that you want to write to me. I am available 24/7 with my high speed broadband connection ;-).
Tr0y (a.k.a Debasis Mohanty)
I work in the dark, I do what I can, I give what I have, my doubt is my passion and my passion is my task. The rest is the madness of art.